870 likes | 1.2k Views
CSC 2260 Operating Systems and Networks Chapter 7 Fall 2008 Dr. Chuck Lillie Managing Local Security in Windows Chapter 7 Threats to Computers and Users Defense Against Threats Windows Local Security Accounts Applying Security to Files, Folders, and Printers in Windows
E N D
CSC 2260Operating Systems and Networks Chapter 7 Fall 2008 Dr. Chuck Lillie
Managing Local Security in Windows Chapter 7 Threats to Computers and Users Defense Against Threats Windows Local Security Accounts Applying Security to Files, Folders, and Printers in Windows Troubleshooting Common Windows Security Problems
Learning Objectives • Recognize security threats and vulnerabilities to desktop PCs and users • Implement methods and technologies that protect against threats • Create local user accounts in Windows • Assign permissions to files, folders, and printers in Windows • Troubleshoot common security problems in Windows
Threats to Computers and Users • Computer Hardware Theft • Secure computers physically • Laptops more vulnerable • Unsophisticated thieves steal for the value of hardware. • Sophisticated thieves will search hard drive for data.
Threats to Computers and Users • Identify Theft • Personal information is stolen and used to commit fraud • Obtaining a social security number and other key personal information may be enough to steal someone's identity • Fraud • The use of deceit and trickery to obtain money or other valuables
Threats to Computers and Users • Accidents, Mistakes, and Natural and Unnatural Disasters • Fires; Earthquakes; Weather; Etc. • Protect against disasters with frequent, comprehensive backups • Backup critical data files • Multiple backup sets
Threats to Computers and Users • Accidents, Mistakes, Natural and Unnatural Disasters (Continued) • Deliberate Attacks
Threats to Computers and Users • Accidents, Mistakes, Natural and Unnatural Disasters (continued) • Deliberate Attacks (continued) • Spim • Phishing • Exposure to Inappropriate or Distasteful Content • Invasion of Privacy • Hoaxes • In Addition …
Defense Against Threats • Authentication and Authorization • Authentication • Verification of who you are • Your identity (user name) • One-factor authentication • Something you know (password) • Two-factor authentication • Something you know plus something you have (a token, like a bankcard) • Three-factor authentication • Above plus biometric data (retinal scan, voice print, etc.)
Defense Against Threats • Authentication and Authorization (continued) • Authorization • Determines the level of access to a computer or a resource. • Includes both authentication, plus verification of access level • Permission describes an action that can be performed on an object
Defense Against Threats • Authentication and Authorization (continued) • Password • A string of characters entered for authentication • Don’t take passwords for granted • Don’t use the same password everywhere • Basic defense against invasion of privacy • Use long and complex password • Do not use common words
Defense Against Threats • Best Practices with User Names and Passwords • Don't Give Away Your User Name and Password • Create Strong Passwords • Never Reuse Passwords • Avoid Creating Unnecessary Online Accounts • Don’t Provide More Information Than Necessary • Always Use Strong Passwords for Certain Types of Accounts
Defense Against Threats • Security Accounts • An account that can be assigned permission to take action on an object or the right to take action on an entire system.
Defense Against Threats • Security Accounts (continued) • User Accounts • Individual account • Includes user name and password • Full name, description, and other information • Exist in all Windows security accounts databases
Defense Against Threats • Security Accounts (continued) • Group Accounts • Contain one or more user and group accounts • Exist in all Windows Security accounts databases • Computer Accounts • Computers may have accounts • Exist in Microsoft domain security accounts databases
Defense Against Threats • Encryption • Transformation of data into a code that can only be decrypted with a secret key or password • Secret key is a special code used to decrypt • Encrypt a local or network-based file • Encrypt data before sending over a network
Defense Against Threats • Encryption (continued) • Only someone with the password or key can decrypt data • Secret key may be held in a digital certificate • Encrypt sensitive data stored on a laptop or in a setting where data theft is a concern • NTFS5 supports file and folder encryption
Defense Against Threats • Firewalls • Firewall technologies • IP packet filter • Proxy service • Encrypted authentication • Virtual private network (VPN)
Defense Against Threats • Firewalls (continued) • Working behind a Firewall in a Large Organization • Firewall configured based on the computers it is protecting. • Working Behind a Firewall at Home or on a Small LAN • Hardware for home and small business called "broadband routers“ • Personal software firewall utilities
Defense Against Threats Step-by-Step 7.01 Configure the Windows Firewall Page 324
Defense Against Threats • Anti-Spam • Spam filters • On corporate mail servers • Internet-based spam filtering service • Installed on desktop computers • Not perfect – may need configuration
Defense Against Threats • Antivirus • Examines contents of disk or RAM for hidden viruses • Detects and removes virus • Antivirus engine and definitions • Requires updating – usually a paid subscription • Free programs available for personal use
Defense Against Threats • Anti-Pop-Up • Block adware, especially pop-ups • Pop-up blocker • Configurable • XP SP2 Pop-Up Blocker for Internet Explorer
Defense Against Threats • More help from Windows XP Service Pack 2 • Windows Security Center monitors • Firewall • Automatic Updates • Virus Protections • A Manage Add-ons button in Internet Options • A pop-up dialog will warn of add-on installation attempt • Protection from opening suspect files
Defense Against Threats • Privacy Protection • Internet Options privacy settings • Control handling of cookies • Settings from block-all-cookies to allow-all-cookies • Balance between convenience and risk
Defense Against Threats • Protection from Inappropriate or Distasteful Content • Web content filter • Add-on or feature of a web browser • Block or allow certain sites • Service on Internet give ratings to web sites • Configure filter to allow or disallow unrated sites • Content Advisor in Internet Explorer
Defense Against Threats Step-by-Step 7.02 Check Out the Content Advisor in Internet Explorer Page 329
Windows Local Security Accounts • Windows Account Administration Tools • Windows NT 4.0 Workstation • Simple Account Management in Windows 2000 and Windows XP Professional • Advanced Account Management in Windows 2000 and Windows XP Professional
Windows Local Security Accounts • Windows Local User Accounts • Built-in local user accounts • Administrator • Guest • User-created accounts
Windows Local Security Accounts • Windows Local Group Accounts • Built-In Local Group Accounts • Automatically-Created Groups • Special Groups/Built-in Security Principals • Creator owner • Everyone
Windows Local Security Accounts • User Rights • The privilege to perform a systemwide function • Windows NT 4.0 Workstation • Policy menu of User Manager • Windows 2000 and Windows XP • Local Security Policy console
Windows Local Security Accounts • Granularity of Control with Groups • Increased in Windows 2000 and XP • Network Configuration Operators group • Built-in • Has a set of rights to perform network tasks
Windows Local Security Accounts • Planning for Users and Groups • Create at least one user other than Administrator • XP Pro requires creation of second member of Administrators group • Then create a limited user
Windows Local Security Accounts • Planning for Users and Groups (continued) • If computer is a workgroup computer … AND if it is used by more than one local user: • Create one limited local account for each user • If sharing files and printers in workgroup: • create an account for each network user
Windows Local Security Accounts • Planning for Users and Groups (continued) • If computer is a member of a domain • Local limited accounts are not needed • Users may log on locally with domain accounts • Member of Administrators group may create users or groups • Use a completed planning form
Windows Local Security Accounts • Administering Local Windows Accounts • In a domain: • Management of users and groups is centralized in the domain • On a standalone or workgroup computer: • Users and groups are managed on each computer
Windows Local Security Accounts • Administering Local Windows Accounts (continued) • Creating a New User • Create one account that is only a member of the local Users group • Create an additional account that is a member of the local Administrators group (mandatory in XP Pro)
Windows Local Security Accounts • Administering Local Windows Accounts (continued) • User Administration in Windows NT 4.0 Workstation • Using User Manager requires knowledge of Windows security accounts • NT Workstation was targeted to advanced users or users who relied on support staff
Windows Local Security Accounts Step-by-Step 7.03 Creating New Users in Windows NT 4.0 Workstation Page 342
Windows Local Security Accounts • Administering Local Windows Accounts (continued) • User Administration in Windows 2000 Pro • Workgroup computer can skip interactive user logon • Authentication is still occurring • Control Panel | Users and Passwords • Users must enter a user name and password to use this computer • Require users to press Ctrl-Alt-Delete before logging on
Windows Local Security Accounts Step-by-Step 7.04 Creating and Configuring a New User Account in Windows 2000 Professional Page 344
Windows Local Security Accounts • Administering Local Windows Accounts (continued) • User Administration in Windows XP Pro • Users Accounts applet • Computer Administrator = member of Admin-istrators group • Limited account = member of Users group (and NOT also a member of Administrators)
Windows Local Security Accounts • Administering Local Windows Accounts (continued) • User Administration in Windows XP Pro (continued) • Password Reset Disk • Created by/for currently logged on user • Use when password is forgotten • Will not lose access to items such as encrypted files • If Administrator resets—password access to encrypted files is lost • Gives user power to fix own passwords • More complicated to do in a domain
Windows Local Security Accounts Step-by-Step 7.05 Creating User Accounts and a Password Reset Disk in Windows XP Page 347
Windows Local Security Accounts • Administering Local Windows Accounts (continued) • Account Policies • Password Policy – password length, etc. • Account lockout policy: lockout after failed attempts
Windows Local Security Accounts • Administering Local Windows Accounts (continued) • Account Policies • Windows NT 4.0 Workstation Account Policies • Set from the Policies menu in User Manager • Windows 2000 Pro and Windows XP Pro • Set from Local Security Policy console
Windows Local Security Accounts • Administering Local Windows Accounts (continued) • Configuring Protection from Physical Access • Log out • Lock computer • Use a password-protected screen saver • Select Standby or Hibernate options • Enable Switch User
Windows Local Security Accounts • Administering Local Windows Accounts (continued) • Configuring Protection from Physical Access (continued) • Downside of logging out & finding a better solution • Lock Computer • Password-Protected Screen Saver • Switch User
Applying Security to Files, Folders, and Printers in Windows • Securing Files and Folders on an NTFS Drive • File and Folder Permissions • Permissions Assigned to Personal Folders • NTFS Permission Inheritance